In this likely AI-generated phishing attack, cybercriminals impersonate PayPal by sending an email from a malicious Gmail address. The email, with the subject line “Security Alert: Verify Your Recent Transaction,” informs the recipient of a recent unauthorized PayPal transaction involving Binance. The message, which features impersonated PayPal branding, includes fabricated transaction details such as an order number, invoice number, transaction date and time, and the amount charged. The recipient is instructed to call a provided customer service number immediately if they did not authorize the charge. However, the phone number connects to the attackers, who will attempt to extract sensitive information or further manipulate the victim into compromising their security. By leveraging fear and urgency around unauthorized financial activity, the attackers increase the likelihood of tricking recipients into taking immediate action without verifying the authenticity of the email.

Older, legacy email security tools struggle to accurately identify this email as an attack because it originates from a reputable email provider and contains neither links nor attachments. Modern, AI-powered email security solutions flag the mismatch between the sender name and the sender domain, recognize the email was sent from an unknown sender, and detect language commonly used in financial theft crimes to correctly identify the email as an attack.

To stay protected, recipients should avoid calling phone numbers listed in unsolicited emails and instead verify account activity by logging directly into PayPal through the official website or app. Organizations should also educate employees about common phishing tactics and implement advanced security measures to detect and prevent sophisticated fraud attempts.

Status Bar Dots
SCR 20250304 obrr

Cybercriminals impersonate PayPal in this likely AI-generated phishing attack, issuing a fake alert about a Binance-linked account

How Does This Attack Bypass Email Defenses?

This email attack bypasses traditional security solutions for multiple reasons, including the following:

  • Reputable Email Provider: The attacker uses a free hosting email service, which is less likely to be blacklisted and can bypass basic email filters.
  • Lack of Attachments: By not including any attachments, the email avoids detection by antivirus and anti-malware systems focused on attachment-based threats.
  • Lack of Links: The absence of links in the email body helps it avoid detection by legacy systems that typically rely on link scanning to identify phishing emails.

How Did Abnormal Detect This Attack?

This attack was detected using AI and ML by analyzing various factors, including the following:

  • Sender Name and Domain Mismatch: The sender name does not match the sender domain, raising suspicion during Abnormal’s analysis.
  • Unknown Sender Consideration: The email is recognized as coming from an unknown sender who has never communicated with the recipient. Abnormal’s platform maintains a communication history and quickly flags deviations from established sender-recipient interaction patterns.
  • Financial Theft Language: The email contains language that may be attempting to steal money from the recipient, a common tactic identified by Abnormal’s content analysis and NLP algorithms to detect potential financial fraud.

By recognizing established normal behavior and detecting these abnormal indicators, a modern email security solution has the ability to prevent this attack from reaching inboxes.

Please note the exact detection mechanism from Abnormal Security's system might include proprietary techniques and methodologies not disclosed here.

Analysis Overview

Type

Credential Vishing

Vector

Text-based

Goal

Credential Theft

Tactic

Free Webmail Account

Theme

Fake Payment Receipt
Cryptocurrency

Impersonated Brands

PayPal

AI Generated

Likely

See How Abnormal Stops Emerging Attacks

See a Demo